src->tlsCertdir,
false,
src->tlsVerify,
- NULL, &tlsProps, NULL,
- NULL, NULL) < 0)
+ NULL, &tlsProps, NULL, NULL) < 0)
goto cleanup;
if (qemuDomainAddTLSObjects(driver, vm, QEMU_ASYNC_JOB_NONE,
const char *srcAlias,
virJSONValuePtr *tlsProps,
char **tlsAlias,
- virJSONValuePtr *secProps,
- char **secAlias)
+ virJSONValuePtr *secProps)
{
+ const char *secAlias = NULL;
+
if (secinfo) {
if (qemuBuildSecretInfoProps(secinfo, secProps) < 0)
return -1;
- if (secAlias &&
- !(*secAlias = qemuDomainGetSecretAESAlias(srcAlias, false)))
- return -1;
+ secAlias = secinfo->s.aes.alias;
}
if (qemuBuildTLSx509BackendProps(tlsCertdir, tlsListen, tlsVerify,
- secAlias ? *secAlias : NULL, qemuCaps,
- tlsProps) < 0)
+ secAlias, qemuCaps, tlsProps) < 0)
return -1;
if (tlsAlias &&
dev->data.tcp.listen,
cfg->chardevTLSx509verify,
charAlias, &tlsProps, tlsAlias,
- &secProps, NULL) < 0)
+ &secProps) < 0)
goto cleanup;
dev->data.tcp.tlscreds = true;
const char *srcAlias,
virJSONValuePtr *tlsProps,
char **tlsAlias,
- virJSONValuePtr *secProps,
- char **secAlias);
+ virJSONValuePtr *secProps);
int qemuDomainAttachControllerDevice(virQEMUDriverPtr driver,
virDomainObjPtr vm,
cfg->migrateTLSx509certdir, tlsListen,
cfg->migrateTLSx509verify,
QEMU_MIGRATION_TLS_ALIAS_BASE,
- &tlsProps, tlsAlias, &secProps, NULL) < 0)
+ &tlsProps, tlsAlias, &secProps) < 0)
goto error;
/* Ensure the domain doesn't already have the TLS objects defined...